selinux-policy/policy/modules/services/mta.te

220 lines
5.7 KiB
Plaintext
Raw Normal View History

2005-05-02 19:24:29 +00:00
policy_module(mta, 2.1.2)
2005-05-02 19:24:29 +00:00
2005-05-12 20:50:09 +00:00
########################################
#
# Declarations
#
2008-09-12 14:18:20 +00:00
attribute mailcontent_type;
attribute mta_exec_type;
2005-08-30 20:47:41 +00:00
attribute mta_user_agent;
attribute mailserver_delivery;
attribute mailserver_domain;
attribute mailserver_sender;
2005-10-23 20:18:36 +00:00
attribute user_mail_domain;
2005-05-02 19:24:29 +00:00
type etc_aliases_t;
files_type(etc_aliases_t)
2005-05-02 19:24:29 +00:00
type etc_mail_t;
2005-10-24 18:40:24 +00:00
files_config_file(etc_mail_t)
2005-05-02 19:24:29 +00:00
type mqueue_spool_t;
2008-09-12 14:18:20 +00:00
files_mountpoint(mqueue_spool_t)
2005-05-02 19:24:29 +00:00
type mail_spool_t;
2008-09-12 14:18:20 +00:00
files_mountpoint(mail_spool_t)
2005-05-12 20:50:09 +00:00
type sendmail_exec_t;
2008-09-12 14:18:20 +00:00
mta_agent_executable(sendmail_exec_t)
2005-05-12 20:50:09 +00:00
2005-11-28 20:25:36 +00:00
mta_base_mail_template(system)
2005-05-12 20:50:09 +00:00
role system_r types system_mail_t;
2008-11-05 16:10:46 +00:00
mta_base_mail_template(user)
typealias user_mail_t alias { staff_mail_t sysadm_mail_t };
typealias user_mail_t alias { auditadm_mail_t secadm_mail_t };
typealias user_mail_tmp_t alias { staff_mail_tmp_t sysadm_mail_tmp_t };
typealias user_mail_tmp_t alias { auditadm_mail_tmp_t secadm_mail_tmp_t };
ubac_constrained(user_mail_t)
ubac_constrained(user_mail_tmp_t)
2005-05-12 20:50:09 +00:00
########################################
#
# System mail local policy
#
# newalias required this, not sure if it is needed in 'if' file
allow system_mail_t self:capability { dac_override };
read_files_pattern(system_mail_t, etc_mail_t, etc_mail_t)
2005-10-25 20:27:08 +00:00
2008-09-12 14:18:20 +00:00
allow system_mail_t mta_exec_type:file entrypoint;
allow system_mail_t mailcontent_type:file read_file_perms;
2005-05-12 20:50:09 +00:00
kernel_read_system_state(system_mail_t)
kernel_read_network_state(system_mail_t)
2005-09-15 21:03:29 +00:00
dev_read_rand(system_mail_t)
2005-06-13 16:22:32 +00:00
dev_read_urand(system_mail_t)
2005-05-12 20:50:09 +00:00
2006-02-02 21:08:12 +00:00
init_use_script_ptys(system_mail_t)
2005-05-12 20:50:09 +00:00
2008-11-05 16:10:46 +00:00
userdom_use_user_terminals(system_mail_t)
userdom_dontaudit_search_user_home_dirs(system_mail_t)
2005-08-30 20:47:41 +00:00
optional_policy(`
2005-10-17 17:55:38 +00:00
apache_read_squirrelmail_data(system_mail_t)
apache_append_squirrelmail_data(system_mail_t)
# apache should set close-on-exec
apache_dontaudit_append_log(system_mail_t)
2006-02-02 21:08:12 +00:00
apache_dontaudit_rw_stream_sockets(system_mail_t)
apache_dontaudit_rw_tcp_sockets(system_mail_t)
apache_dontaudit_rw_sys_script_stream_sockets(system_mail_t)
2005-10-17 17:55:38 +00:00
')
optional_policy(`
2005-11-28 22:19:08 +00:00
arpwatch_manage_tmp_files(system_mail_t)
ifdef(`hide_broken_symptoms', `
2006-02-02 21:08:12 +00:00
arpwatch_dontaudit_rw_packet_sockets(system_mail_t)
2005-11-28 22:19:08 +00:00
')
2005-10-25 20:27:08 +00:00
')
optional_policy(`
2005-08-30 20:47:41 +00:00
cron_read_system_job_tmp_files(system_mail_t)
2006-02-02 21:08:12 +00:00
cron_dontaudit_write_pipes(system_mail_t)
2005-08-30 20:47:41 +00:00
')
optional_policy(`
2005-09-20 18:49:13 +00:00
cvs_read_data(system_mail_t)
')
optional_policy(`
2005-08-30 20:47:41 +00:00
logrotate_read_tmp_files(system_mail_t)
')
optional_policy(`
2006-01-10 14:39:21 +00:00
logwatch_read_tmp_files(system_mail_t)
')
optional_policy(`
# newaliases runs as system_mail_t when the sendmail initscript does a restart
milter_getattr_all_sockets(system_mail_t)
')
2006-04-06 15:03:23 +00:00
optional_policy(`
nagios_read_tmp_files(system_mail_t)
')
optional_policy(`
manage_dirs_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_lnk_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_fifo_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_sock_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
files_etc_filetrans(system_mail_t, etc_aliases_t, { file lnk_file sock_file fifo_file })
2005-10-23 20:18:36 +00:00
2006-02-20 21:33:25 +00:00
domain_use_interactive_fds(system_mail_t)
2005-11-09 15:51:22 +00:00
2005-11-28 22:19:08 +00:00
# postfix needs this for newaliases
files_getattr_tmp_dirs(system_mail_t)
2005-11-08 22:00:30 +00:00
2005-11-28 22:19:08 +00:00
postfix_exec_master(system_mail_t)
postfix_read_config(system_mail_t)
postfix_search_spool(system_mail_t)
2005-05-13 14:37:13 +00:00
2005-11-28 22:19:08 +00:00
ifdef(`distro_redhat',`
# compatability for old default main.cf
postfix_config_filetrans(system_mail_t, etc_aliases_t, { dir file lnk_file sock_file fifo_file })
2005-11-28 22:19:08 +00:00
')
optional_policy(`
2006-02-20 14:31:45 +00:00
cron_rw_tcp_sockets(system_mail_t)
2005-11-28 22:19:08 +00:00
')
2005-08-30 20:47:41 +00:00
')
2006-04-05 15:32:38 +00:00
optional_policy(`
qmail_domtrans_inject(system_mail_t)
')
2006-05-01 20:36:13 +00:00
optional_policy(`
sxid_read_log(system_mail_t)
')
optional_policy(`
2008-11-05 16:10:46 +00:00
userdom_dontaudit_use_user_ptys(system_mail_t)
optional_policy(`
2005-11-28 22:19:08 +00:00
cron_dontaudit_append_system_job_tmp_files(system_mail_t)
')
2005-05-13 14:37:13 +00:00
')
2005-05-12 20:50:09 +00:00
optional_policy(`
2006-02-02 21:08:12 +00:00
smartmon_read_tmp_files(system_mail_t)
2006-01-04 15:26:42 +00:00
')
2005-11-28 22:19:08 +00:00
# should break this up among sections:
2005-11-08 22:00:30 +00:00
optional_policy(`
# why is mail delivered to a directory of type arpwatch_data_t?
2005-11-08 22:00:30 +00:00
arpwatch_search_data(mailserver_delivery)
arpwatch_manage_tmp_files(mta_user_agent)
ifdef(`hide_broken_symptoms', `
2006-02-02 21:08:12 +00:00
arpwatch_dontaudit_rw_packet_sockets(mta_user_agent)
')
optional_policy(`
2005-11-28 22:19:08 +00:00
cron_read_system_job_tmp_files(mta_user_agent)
')
')
2008-11-05 16:10:46 +00:00
########################################
#
# User send mail local policy
#
domain_use_interactive_fds(user_mail_t)
userdom_use_user_terminals(user_mail_t)
# Write to the user domain tty. cjp: why?
userdom_use_user_terminals(mta_user_agent)
# Create dead.letter in user home directories.
userdom_manage_user_home_content_files(user_mail_t)
userdom_user_home_dir_filetrans_user_home_content(user_mail_t, file)
# for reading .forward - maybe we need a new type for it?
# also for delivering mail to maildir
userdom_manage_user_home_content_dirs(mailserver_delivery)
userdom_manage_user_home_content_files(mailserver_delivery)
userdom_manage_user_home_content_symlinks(mailserver_delivery)
userdom_manage_user_home_content_pipes(mailserver_delivery)
userdom_manage_user_home_content_sockets(mailserver_delivery)
userdom_user_home_dir_filetrans_user_home_content(mailserver_delivery, { dir file lnk_file fifo_file sock_file })
# Read user temporary files.
userdom_read_user_tmp_files(user_mail_t)
userdom_dontaudit_append_user_tmp_files(user_mail_t)
# cjp: this should probably be read all user tmp
# files in an appropriate place for mta_user_agent
userdom_read_user_tmp_files(mta_user_agent)
tunable_policy(`use_samba_home_dirs',`
fs_manage_cifs_files(user_mail_t)
fs_manage_cifs_symlinks(user_mail_t)
')
optional_policy(`
allow user_mail_t self:capability dac_override;
# Read user temporary files.
# postfix seems to need write access if the file handle is opened read/write
userdom_rw_user_tmp_files(user_mail_t)
postfix_read_config(user_mail_t)
postfix_list_spool(user_mail_t)
')